Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: regoonline.com regodesigns.com
I ran this command: n/a
It produced this output: n/a
My web server is (include version): Apache/2.4.37 (Oracle Linux)
The operating system my web server runs on is (include version): Oracle Linux 8.6 (email server runs CentOS 7.0)
My hosting provider, if applicable, is: self hosted, onsite, postfix and dovecot
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): certbot 1.32.0
I need a SAN Cert that includes
regoonline.com
regodesigns.com
www.regoonline.com
www.regodesigns.com
estimator.regodesigns.com
Currently we send all employee to customer, order confirmations from SAP and invoices from SAP op-in emails using @regoonline.com. We still have email messages being classified "SPAM" or undelivered. WE SEND NOTHING UNSOLISITED.
Professional advice has suggested this is due to addresses being @regoonline.com but all the links inside point to regodesigns.com. So now we are going to migrate everyone to @regodesigns.com email addresses with the old @regoonline.com email address configured as an alias email address for each user.
From my understanding, each domain that is within the SAN is renewed when the SAN is renewed. Is that correct?
TIA